Penetration Testing mailing list archives
Re: Mac spoofing using libnet
From: "infos () aql fr" <infos () aql fr>
Date: Mon, 25 Mar 2002 11:13:05 +0100
Hello,
I'm currently looking at a system which seems to avoid using ARP to resolve a mac address. Instead, it's looking at the mac address embedded in the packet. I was wondering, if there are any tools built around Libnet (or similar) which are able to handle a whole tcp/IP session.
I am not really sure to understand your needs. However, you might want to take a look at tool 171 of lcrzoex. It works under Linux, Windows, xBSD, Solaris. Read documentation available at : http://www.laurentconstantin.com/common/lcrzoex/doc/en/examples.html Lcrzoex is at : http://www.laurentconstantin.com/ http://go.to/laurentconstantin/ http://laurentconstantin.est-la.com/ ---------------------------------------------------------------------------- This list is provided by the SecurityFocus Security Intelligence Alert (SIA) Service. For more information on SecurityFocus' SIA service which automatically alerts you to the latest security vulnerabilities please see: https://alerts.securityfocus.com/
Current thread:
- Mac spoofing using libnet preceptor (Mar 22)
- <Possible follow-ups>
- Re: Mac spoofing using libnet infos () aql fr (Mar 25)